SlideShare a Scribd company logo
Lecturing
Phd Candidate
Social Entrepreneur
Previous life:
Entrepreneurship, Technology Entrepreneurship
Open and User Innovation,
Industrial Marketing and Entrepreneurship
B.S, M.Sc, MBA & MA,
IT support,Telecom software Engineer, .NET, Java
developer, Project Manager, Business Developer
www.okfn.se - www.okfn.orgSERDAR TEMIZ
Chairman Open Knowledge Sweden
serdar_temiz
www.serdartemiz.com 2016
S W E D E N
Data Privacy, Corporates and States
Library User
Peter Krantz,Kungligabiblioteket
Analogy of Communication
Libraries Services and Privacy-Then
Library Users
Kommunens
it-leverantörer
Analogy of Communication
Libraries Services and Privacy-Now
Peter Krantz,Kungligabiblioteket
How people react
to internet
How much control
they have on their
online existence
How much control do you feel you have over the
information you provide online e.g. the ability to
correct,change or delete this information?
Complete control
Partial control
No control at all
Depends on the site or app
Don’t know
31%
15%
50%
Eurobarometer
To what extend do you trust
the following authorities and
private companies to protect
your personal information? !
Data Privacy, Corporates and States
I really do not agree with
the people!
We should trust business and
states for the privacy.
Our govenrments and
companies are doing
everything to protect it!
Information you give us. For example,
many of our services require you to sign up
for a TrustCorp Account. When you do,
we’ll ask for personal information, like
your name, email address, telephone
number or credit card to store with your
account.
We collect
Any more?
Information we get from your use of our services.
Device information:
- Device-specific information device identifiers
- Phone number
Log information:
- Your search queries.
- Phone number, calling-party number, forwarding
numbers, time and date of calls, duration of calls, SMS
routing information and types of calls.
What more?
Internet protocol address.
Device event information such as crashes, system activity,
hardware settings, browser type, browser language, the
date and time of your request and referral URL.
Location information
Including IP address, GPS, and other sensors that may,
for example, provide TrustCorp with information on
nearby devices, Wi-Fi access points and cell towers.
Unique application numbers
Local storage
Cookies and similar technologies
Trust Corp.
Our Privacy Policy may change
from time to time. We will not
reduce your rights under this
Privacy Policy without your
explicit consent.
Not enough, We may Charge You!
Accessing and updating your personal information
“….we will do so for free, except where it would require a
disproportionate effort….”we may not immediately delete
residual copies from our active servers and may not
remove information from our backup systems.
We also share!
- For legal reasons
- We will share personal information with companies,
organizations or individuals outside of TrustCorp if we have a
good-faith belief that access, use, preservation or disclosure of the
information is reasonably necessary to:
Blablablabla....
TrustMEtoo Corp.
To start, Parscale uploaded the names, email addresses, and phone
numbers of known Trump supporters into the TrustMEtoo advertising
platform. Next, Parscale used TrustMEtoo’s “Custom Audiences from
Customer Lists” to match these real people with their virtual
TrustMEtoo profiles. With TrustMEtoo’s “Audience Targeting
Options” feature, ads can be targeted to people based on their
TrustMEtoo activity, ethic affinity, or “location and demographics like
age, gender and interests. You can even target your ad to people
based on what they do off of TrustMEtoo.”
Parscale then expanded Trump’s pool of targeted TrustMEtoo users
using “Lookalike Audiences”, a powerful data tool that automatically
found other people on TrustMEtoo with “common qualities” that “look
like” known Trump supporters. Finally, Parscale used TrustMEtoo’s
“Brand Lift” survey capabilities to measure the success of the ads.
Product: Project Alamo Database
Under the guidance of Jared Kushner, a senior
campaign advisor and son-in-law of President-Elect
Trump, Parscale quietly began building his own list of
Trump supporters. Trump’s revolutionary database,
named Project Alamo, contains the identities of
220 million people in the United States, and
approximately 4,000 to 5,000 individual data points
about the online and offline life of each person.
Funded entirely by the Trump campaign, this database
is owned by Trump and continues to exist.
We should trump governments
- Who cares registry of Muslims by Trump,
- He registered everyone!
Muslim Registry in USA?
“According to a half dozen current and former
employees, who spoke on the condition of
anonymity, leaked Procera documents and
internal communications, Turk Telekom
requested not just a feed of subscribers’
usernames and passwords for unencrypted
websites, but also their IP addresses, what
sites they’d visited and when.”
Forbes, October 2016
“We were being asked to turn innocent
tech into evil surveillance gear, and hand it
to a regime that had become increasingly
repressive”
Senior Technical Engineer Feromont Kriss Andsten,
Forbes, October 2016
How Repressive:
“We are talking about a country where a
president candidate against Erdoğan, Selahattin
Demirtaş, co-chair of Democracy and Peace
Party of People, is in prison now!.”
IamTrustableToo Corp.
“Please be aware that if your spoken words
include personal or other sensitive information,
that information will be among the data
captured and transmitted to a third party.”
TrustTheState
Since 1975, Sweden has taken a DNA sample from all newborns for medical
research purposes, and asked parents’ consent to do so for this research
purpose. This means that over time, Sweden has built the world’s most
comprehensive DNA database over everybody under 43 years of age.
But now, politicians are considering opening up this research-only DNA
database to law enforcement and private insurance companies.
Jul 5, 2016 by Rick Falkvinge
Imagine
Sensor image
Phone image
With our phone, laptops,
cameras, bus cameras, store
cameras, security cameras,
videocalls, phone calls, web
activities..
When we are being watched
- Behavior becomes conformist and as accepted by
the power owners,
- Expected by power elite and by mandates of
society
- Creativity, freedom and actually humanity dies!
If Hitler had this survalience power!!!
Anonymous
Example of encription
4 Things to Consider
1) Researchers / People/ Organisations that can
ask, test and verify
- What is collected
- How collected
- How saved
- How anonymized
- How encrypted
2) Minimum Data is the best data!
- Best data protection is not to have all these data!..
- With current state, I have no chance not to be
recorderd with TruspCorp even thoguh i do not use
their services.
- Some people claim that privacy will no longer be
issue for the people, they will not care.
- Will we ignore these minority with the suppression
of majority?
3) Privacy of Not your Customers
- We need to have expiration of data!
- Criminal records are deleted but not my personal search
phrases?
Data collected
from Serdar
Temiz is dead
now!
Deleted
in Peace
4) Data should die!
Problem?
‘If you have something that you don’t want
anyone to know, maybe you shouldn’t be
doing it in the first place’”
“Trust us we are good guys!”
“Arguing that you don’t care about the right to
privacy because you have nothing to hide is
no different than saying you don’t care about
free speech because you have nothing to say.”
Edward Snowden
Businesses should put
privacy as a core part of their
business and when I want to
be digitally dead, I should
be able to do that, without
paying a fee.
If you do not want share and be
transparent on how you deal with all
these data then you have something to
hide!
All TrustCorps... TrustGovs...
Thank You!
serdar_temiz
www.serdartemiz.com
Serdar Temiz

More Related Content

PDF
Data Breach Response: A Guide for Business
PPTX
Internet use issues
PPTX
Uga Social Media Privacy June2011
PPTX
Data security problems
DOCX
Data Mining: Privacy and Concerns
PPTX
Media Law
PDF
Isao MATSUNAMI - Digital security in japanese journalism
Data Breach Response: A Guide for Business
Internet use issues
Uga Social Media Privacy June2011
Data security problems
Data Mining: Privacy and Concerns
Media Law
Isao MATSUNAMI - Digital security in japanese journalism

Viewers also liked (14)

PPTX
Busıness Model Innovation Business Model Canvas Toolbox 2016
PPTX
Introduction to OPEN INNOVATION
PPTX
Open Data Innovation from GEO DATA Perspective
PPT
Fast Prototyping Customer Development Mock Ups 2014
PPT
Project Integration Management
PPTX
Start up finance & venture capital
PPT
UML Basics
PPT
Project Scope Management
PPTX
Project Cost Management
PPTX
Project Quality Management
PPTX
Organization Structure - stake holder -human resources management during proj...
PPTX
Project Time Management
PPTX
Introduction to Entrepreneurship , Entrepreneurship in Action, KTH
PPTX
Innovation & Business Model & Business Model Canvas 2014
Busıness Model Innovation Business Model Canvas Toolbox 2016
Introduction to OPEN INNOVATION
Open Data Innovation from GEO DATA Perspective
Fast Prototyping Customer Development Mock Ups 2014
Project Integration Management
Start up finance & venture capital
UML Basics
Project Scope Management
Project Cost Management
Project Quality Management
Organization Structure - stake holder -human resources management during proj...
Project Time Management
Introduction to Entrepreneurship , Entrepreneurship in Action, KTH
Innovation & Business Model & Business Model Canvas 2014
Ad

Similar to Data Privacy, Corporates and States (20)

PDF
Online privacy concerns (and what we can do about it)
PPTX
Big Data for a Better World
PPT
Med122 the case for privacy 2014
PPT
Introduction to Privacy and Social Networking
PPTX
Privacy reconsidered
PDF
Online Privacy in the Year of the Dragon
PPT
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
PDF
Infosecurity2013nl 131103184054-phpapp01
PPTX
Team Lecture Presentation 2
PPTX
Chapter 8 Big Data and Privacy
PPT
The case for privacy (2012)
PPTX
Chapter 8 big data and privacy - social media 3533
PDF
Is your data secure? privacy and trust in the social web
PPT
Privacy with Internet
PDF
Consumers' and Citizens' Privacy
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
PPTX
Privacy isdeadgetoveritredux 10.12.2014
PDF
Privacy flip book assignment film 260 queensu kc
PPTX
Privacy in the Information Age
PPTX
Privacy in the Information Age [Q3 2015 version]
Online privacy concerns (and what we can do about it)
Big Data for a Better World
Med122 the case for privacy 2014
Introduction to Privacy and Social Networking
Privacy reconsidered
Online Privacy in the Year of the Dragon
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Infosecurity2013nl 131103184054-phpapp01
Team Lecture Presentation 2
Chapter 8 Big Data and Privacy
The case for privacy (2012)
Chapter 8 big data and privacy - social media 3533
Is your data secure? privacy and trust in the social web
Privacy with Internet
Consumers' and Citizens' Privacy
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy isdeadgetoveritredux 10.12.2014
Privacy flip book assignment film 260 queensu kc
Privacy in the Information Age
Privacy in the Information Age [Q3 2015 version]
Ad

More from Serdar Temiz (13)

PPTX
Business Model Canvas 2015
PDF
Customer Development Fast Protyping
PDF
Introduction to Entepreneurship ME2603 KTH
PDF
How Open Data Changes Our Life?
PPTX
Project Risk Management (10)
PPTX
Project Procurement Management
PPTX
Project Management Introduction General PM lifecycles
PDF
Open Data for Digital Activism and Civic Engegament
PPTX
Introduction to OKFN
PPTX
Business model canvas 2013
PPTX
Open Data Open Innovation
PDF
Fast prototypes and customer development for start ups
PDF
Entepreneurship for engineers
Business Model Canvas 2015
Customer Development Fast Protyping
Introduction to Entepreneurship ME2603 KTH
How Open Data Changes Our Life?
Project Risk Management (10)
Project Procurement Management
Project Management Introduction General PM lifecycles
Open Data for Digital Activism and Civic Engegament
Introduction to OKFN
Business model canvas 2013
Open Data Open Innovation
Fast prototypes and customer development for start ups
Entepreneurship for engineers

Recently uploaded (20)

PPTX
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
PPTX
Bob Stewart Journey to Rome 07 30 2025.pptx
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPT
strucure of protein geomics for new .ppt
PPTX
Caption Text about Social Media Post in Internet
PPTX
IBA DISTRICT PIR PRESENTATION.POWERPOINT
PPTX
Assam' Vibrant Bihu Festival Bihu presentation.pptx
PPTX
Cohort Study_PPT.group presentation_pdf.pptx
PPTX
2025-08-03 Joseph 01 (shared slides).pptx
PPTX
Selecting relevant value chain/s for Impactful Development Policies
PPTX
Information Security and Risk Management.pptx
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPTX
Postmodernism notes for literature students
PPTX
PHILIPPINE LITERATURE DURING SPANISH ERA
PDF
Enhancing Bambara Groundnut Production Through Improved Agronomic Practices
PPTX
business communication final draftt.pptx
PPTX
What is Clause, definition and structure
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
Bob Stewart Journey to Rome 07 30 2025.pptx
Emphasizing It's Not The End 08 06 2025.pptx
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
strucure of protein geomics for new .ppt
Caption Text about Social Media Post in Internet
IBA DISTRICT PIR PRESENTATION.POWERPOINT
Assam' Vibrant Bihu Festival Bihu presentation.pptx
Cohort Study_PPT.group presentation_pdf.pptx
2025-08-03 Joseph 01 (shared slides).pptx
Selecting relevant value chain/s for Impactful Development Policies
Information Security and Risk Management.pptx
Learning-Plan-5-Policies-and-Practices.pptx
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
Postmodernism notes for literature students
PHILIPPINE LITERATURE DURING SPANISH ERA
Enhancing Bambara Groundnut Production Through Improved Agronomic Practices
business communication final draftt.pptx
What is Clause, definition and structure

Data Privacy, Corporates and States

  • 1. Lecturing Phd Candidate Social Entrepreneur Previous life: Entrepreneurship, Technology Entrepreneurship Open and User Innovation, Industrial Marketing and Entrepreneurship B.S, M.Sc, MBA & MA, IT support,Telecom software Engineer, .NET, Java developer, Project Manager, Business Developer www.okfn.se - www.okfn.orgSERDAR TEMIZ Chairman Open Knowledge Sweden serdar_temiz www.serdartemiz.com 2016 S W E D E N
  • 3. Library User Peter Krantz,Kungligabiblioteket Analogy of Communication Libraries Services and Privacy-Then
  • 4. Library Users Kommunens it-leverantörer Analogy of Communication Libraries Services and Privacy-Now Peter Krantz,Kungligabiblioteket
  • 5. How people react to internet How much control they have on their online existence
  • 6. How much control do you feel you have over the information you provide online e.g. the ability to correct,change or delete this information? Complete control Partial control No control at all Depends on the site or app Don’t know 31% 15% 50% Eurobarometer
  • 7. To what extend do you trust the following authorities and private companies to protect your personal information? !
  • 9. I really do not agree with the people! We should trust business and states for the privacy. Our govenrments and companies are doing everything to protect it!
  • 10. Information you give us. For example, many of our services require you to sign up for a TrustCorp Account. When you do, we’ll ask for personal information, like your name, email address, telephone number or credit card to store with your account. We collect
  • 11. Any more? Information we get from your use of our services. Device information: - Device-specific information device identifiers - Phone number Log information: - Your search queries. - Phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls.
  • 12. What more? Internet protocol address. Device event information such as crashes, system activity, hardware settings, browser type, browser language, the date and time of your request and referral URL. Location information Including IP address, GPS, and other sensors that may, for example, provide TrustCorp with information on nearby devices, Wi-Fi access points and cell towers. Unique application numbers Local storage Cookies and similar technologies
  • 13. Trust Corp. Our Privacy Policy may change from time to time. We will not reduce your rights under this Privacy Policy without your explicit consent.
  • 14. Not enough, We may Charge You! Accessing and updating your personal information “….we will do so for free, except where it would require a disproportionate effort….”we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.
  • 15. We also share! - For legal reasons - We will share personal information with companies, organizations or individuals outside of TrustCorp if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to: Blablablabla....
  • 16. TrustMEtoo Corp. To start, Parscale uploaded the names, email addresses, and phone numbers of known Trump supporters into the TrustMEtoo advertising platform. Next, Parscale used TrustMEtoo’s “Custom Audiences from Customer Lists” to match these real people with their virtual TrustMEtoo profiles. With TrustMEtoo’s “Audience Targeting Options” feature, ads can be targeted to people based on their TrustMEtoo activity, ethic affinity, or “location and demographics like age, gender and interests. You can even target your ad to people based on what they do off of TrustMEtoo.” Parscale then expanded Trump’s pool of targeted TrustMEtoo users using “Lookalike Audiences”, a powerful data tool that automatically found other people on TrustMEtoo with “common qualities” that “look like” known Trump supporters. Finally, Parscale used TrustMEtoo’s “Brand Lift” survey capabilities to measure the success of the ads.
  • 17. Product: Project Alamo Database Under the guidance of Jared Kushner, a senior campaign advisor and son-in-law of President-Elect Trump, Parscale quietly began building his own list of Trump supporters. Trump’s revolutionary database, named Project Alamo, contains the identities of 220 million people in the United States, and approximately 4,000 to 5,000 individual data points about the online and offline life of each person. Funded entirely by the Trump campaign, this database is owned by Trump and continues to exist.
  • 18. We should trump governments - Who cares registry of Muslims by Trump, - He registered everyone!
  • 20. “According to a half dozen current and former employees, who spoke on the condition of anonymity, leaked Procera documents and internal communications, Turk Telekom requested not just a feed of subscribers’ usernames and passwords for unencrypted websites, but also their IP addresses, what sites they’d visited and when.” Forbes, October 2016
  • 21. “We were being asked to turn innocent tech into evil surveillance gear, and hand it to a regime that had become increasingly repressive” Senior Technical Engineer Feromont Kriss Andsten, Forbes, October 2016
  • 22. How Repressive: “We are talking about a country where a president candidate against Erdoğan, Selahattin Demirtaş, co-chair of Democracy and Peace Party of People, is in prison now!.”
  • 23. IamTrustableToo Corp. “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”
  • 24. TrustTheState Since 1975, Sweden has taken a DNA sample from all newborns for medical research purposes, and asked parents’ consent to do so for this research purpose. This means that over time, Sweden has built the world’s most comprehensive DNA database over everybody under 43 years of age. But now, politicians are considering opening up this research-only DNA database to law enforcement and private insurance companies. Jul 5, 2016 by Rick Falkvinge
  • 25. Imagine Sensor image Phone image With our phone, laptops, cameras, bus cameras, store cameras, security cameras, videocalls, phone calls, web activities..
  • 26. When we are being watched - Behavior becomes conformist and as accepted by the power owners, - Expected by power elite and by mandates of society - Creativity, freedom and actually humanity dies!
  • 27. If Hitler had this survalience power!!!
  • 30. 4 Things to Consider
  • 31. 1) Researchers / People/ Organisations that can ask, test and verify - What is collected - How collected - How saved - How anonymized - How encrypted
  • 32. 2) Minimum Data is the best data! - Best data protection is not to have all these data!..
  • 33. - With current state, I have no chance not to be recorderd with TruspCorp even thoguh i do not use their services. - Some people claim that privacy will no longer be issue for the people, they will not care. - Will we ignore these minority with the suppression of majority? 3) Privacy of Not your Customers
  • 34. - We need to have expiration of data! - Criminal records are deleted but not my personal search phrases? Data collected from Serdar Temiz is dead now! Deleted in Peace 4) Data should die!
  • 35. Problem? ‘If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place’” “Trust us we are good guys!” “Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” Edward Snowden
  • 36. Businesses should put privacy as a core part of their business and when I want to be digitally dead, I should be able to do that, without paying a fee.
  • 37. If you do not want share and be transparent on how you deal with all these data then you have something to hide! All TrustCorps... TrustGovs...